← Back to SOC feed Coverage →

ThreatFox: Stealc IOCs

ioc-hunt HIGH ThreatFox
UrlClickEvents
iocthreatfoxwin-stealc
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-05T23:00:00Z · Confidence: high

Hunt Hypothesis

Adversaries using Stealc malware may exfiltrate sensitive data through unusual outbound traffic or unexpected data transfers, leveraging malicious URLs to establish command-and-control communication. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate data exfiltration attempts early.

IOC Summary

Malware Family: Stealc Total IOCs: 2 IOC Types: url

TypeValueThreat TypeFirst SeenConfidence
urlhxxp://5[.]252[.]177[.]67/bb7f17919d0a4d0aaf22.phpbotnet_cc2026-05-05100%
urlhxxp://45[.]131[.]214[.]189/6a4133a676c340b0b27b.phpbotnet_cc2026-05-05100%

KQL: Url Hunt

// Hunt for access to known malicious URLs
// Source: ThreatFox - Stealc
let malicious_urls = dynamic(["http://5.252.177.67/bb7f17919d0a4d0aaf22.php", "http://45.131.214.189/6a4133a676c340b0b27b.php"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
UrlClickEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.stealc/